Cyber Security Vocabulary Review

Cyber Security Vocabulary Review

Professional Development

6 Qs

quiz-placeholder

Similar activities

PT Protecting Your Smartphone Privacy

PT Protecting Your Smartphone Privacy

University - Professional Development

6 Qs

ICT Skills

ICT Skills

Professional Development

10 Qs

Review- Day 4

Review- Day 4

KG - Professional Development

10 Qs

BA2 principles of bus.doc prod and info managemen quick quiz

BA2 principles of bus.doc prod and info managemen quick quiz

Professional Development

10 Qs

Cyber Security Actions

Cyber Security Actions

Professional Development

11 Qs

HIM Competency Assignment Quiz

HIM Competency Assignment Quiz

Professional Development

10 Qs

Digital Literacy

Digital Literacy

Professional Development

11 Qs

lesson 5

lesson 5

Professional Development

10 Qs

Cyber Security Vocabulary Review

Cyber Security Vocabulary Review

Assessment

Quiz

Other

Professional Development

Medium

Created by

Stephanie Smith

Used 17+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Encryption is

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the illegal practice of sending emails that pretend to be from legitimate companies in the hopes that the recipient will reveal personal information such as credit card numbers.

a process that encodes a message or data so that it can only be read by certain people. This helps protect the information.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cyber Security can be defined as

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks.

All of the above

None of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware is

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks.

a login method that only grants the user access after they have showed multiple credentials to verify their identity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Multi-factor Authentication (MFA or 2FA)

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks.

a login method that only grants the user access after they have showed multiple credentials to verify their identity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social Engineering is

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the practice of protecting networks, individual computers, and personal devices such as phones from malicious outside attacks.

the illegal practice of sending emails that pretend to be from legitimate companies in the hopes that the recipient will reveal personal information such as credit card numbers.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing is

a catchall term for malicious software designed to gain access to a network, which can damage data or allow hackers access to personal information.

the use of deception to trick somebody into sharing their personal information.

the illegal practice of sending emails that pretend to be from legitimate companies in the hopes that the recipient will reveal personal information such as credit card numbers.

a process that encodes a message or data so that it can only be read by certain people. This helps protect the information.